CVE编号
CVE-2021-3191利用情况
暂无补丁情况
N/A披露时间
2021-02-10漏洞描述
Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows Remote Unauthorized Access for T0320L01^ABY and T0320L01^ACD, T0952L01^AAR through T0952L01^AAX, and T0986L01^AAD through T0986L01^AAJ (L) and T0320H01^ABW through T0320H01^ACC, T0952H01^AAQ through T0952H01^AAW, and T0986H01^AAC through T0986H01^AAI (J and H).解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://idelji.com | |
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbns... | |
https://techpartner.ext.hpe.com/TechPartner/PartnerDetail.xhtml?Partner=Idelji |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | hpe | nonstop | - | - | |||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | * |
From (including) 06.03 |
Up to (including) 06.23.01 |
||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | * |
From (including) 15.08.00 |
Up to (including) 19.08.00 |
||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | * |
From (including) t0320h01\^abw |
Up to (including) t0320h01\^acc |
||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | * |
From (including) t0952h01\^aaq |
Up to (including) t0952h01\^aaw |
||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | * |
From (including) t0952l01\^aar |
Up to (including) t0952l01\^aax |
||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | * |
From (including) t0986h01\^aac |
Up to (including) t0986h01\^aai |
||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | * |
From (including) t0986l01\^aad |
Up to (including) t0986l01\^aaj |
||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | 15.02.00 | - | |||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | 15.02.01 | - | |||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | t0320l01^aby | - | |||||
运行在以下环境 | |||||||||
应用 | hpe | web_viewpoint | t0320l01^acd | - | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | kernel | * |
Up to (excluding) 4.14.232-123.381.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | kernel | * |
Up to (excluding) 4.18.0-348.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | linux | * |
Up to (excluding) 4.19.194-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | linux | * |
Up to (excluding) 4.9.272-1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | kernel | * |
Up to (excluding) 5.3.18-lp152.106.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | kernel | * |
Up to (excluding) 5.3.18-38.31.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_6 | kernel | * |
Up to (excluding) 4.1.12-124.52.4.el6uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | kernel | * |
Up to (excluding) 5.4.17-2102.202.5.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | kernel | * |
Up to (excluding) 5.4.17-2102.202.5.el8uek |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | kernel | * |
Up to (excluding) 4.18.0-348.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | kernel | * |
Up to (excluding) 4.12.14-16.80.1 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...